Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Component method for encrypting data safety conveying channel

A transmission channel and encrypted data technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of data encryption function and countermeasures

Inactive Publication Date: 2020-08-11
安徽拔沃乎机电科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the software implementation of the encryption algorithm, it is easy for an attacker to crack the access. The attacker can not only see the binary values ​​​​of the memory loaded on the communication device and replace these values, but also control it at will. encryption algorithm
If the key used for encryption / decryption is exposed to the attacker through the above-mentioned attack memory, the attacker can easily decipher any ciphertext, resulting in the encryption algorithm actually not having any data encryption function, and may be countered by an attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Component method for encrypting data safety conveying channel
  • Component method for encrypting data safety conveying channel
  • Component method for encrypting data safety conveying channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] A component method for encrypted data security transmission channel, the steps of which are as follows:

[0065] (1) Decryption stage 1;

[0066] S1: In the process of encrypted data transmission, the plug-in device 200 is inserted into the installation cylinder 110 along the socket 117, the decryption mechanism 1 210 in the plug-in device 200 matches the encryption mechanism 120, and the encryption mechanism 120 decrypts and internally conduction;

[0067] The insulating installation cylinder 110, the first encryption mechanism 120, the second encryption mechanism 130, the output contact 140 and the output wire 150 arranged on the outer surface of the installation cylinder 110 together constitute the transmission device 100, and the input end of the output wire 150 establishes data with the memory The connection is turned on, the output terminal is connected to the output contact 140, the encryption mechanism one 120 and the encryption mechanism two 130 are internally...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a component method of an encrypted data safety transmission channel, which comprises the following steps: firstly, in a data encryption transmission process, an inserting deviceis inserted into a mounting cylinder along an inserting hole, a decryption mechanism I in the inserting device is matched with an encryption mechanism I, and the encryption mechanism I decrypts and is internally conducted; then, a decryption mechanism II in the plugging device is matched with an encryption mechanism II; after the encryption mechanism I is conducted with the encryption mechanism II, the line segment I, the line segment II and the line segment III are connected, that is, the output wire establishes a data transmission channel between the memory and the output contact, and the input contact is in contact connection with the output contact, so that the output wire is in butt joint connection with the output wire; and finally, the output contact is in contact connection with the input contact, and data is transmitted into the mobile hard disk by the memory through the output wire, the output contact, the input contact and the input wire, so that encrypted transmission of the data is realized.

Description

technical field [0001] The invention relates to the technical field of encrypted data transmission, in particular to a component method of a secure transmission channel for encrypted data. Background technique [0002] At this stage, on communication devices on computers, tablet computers or smart phones, software is often used to encrypt data transmission. However, for the software implementation of the encryption algorithm, it is easy for an attacker to crack the access. The attacker can not only see the binary values ​​​​of the memory loaded on the communication device and replace these values, but also control it at will. encryption calculation. If the key used for encryption / decryption is exposed to the attacker through the above-mentioned attack memory, the attacker can easily decipher any ciphertext, resulting in the encryption algorithm actually not having any data encryption function, and may be countered by an attacker. In order to overcome the above-mentioned t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/85G06F21/60
CPCG06F21/606G06F21/85
Inventor 不公告发明人
Owner 安徽拔沃乎机电科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products